Silent Ransom Group Claims Phishing Attack on Law Firm Jones Day, Demands $13M

Global Law Firm Jones Day Hit by Silent Ransom Group in Phishing Attack, Client Files Accessed

HIGH
April 9, 2026
5m read
Data BreachPhishingThreat Actor

Impact Scope

Affected Companies

Jones Day

Industries Affected

Legal Services

Related Entities

Threat Actors

Silent Ransom Group (SRG)Luna MothChatty SpiderUNC3753Conti

Organizations

Other

Full Report

Executive Summary

Global law firm Jones Day announced on April 7, 2026, that it had suffered a cyberattack originating from a phishing campaign. The firm stated that an unauthorized third party gained access to a limited number of files related to 10 clients. Responsibility for the attack has been claimed by the Silent Ransom Group (SRG), a threat actor also known as Luna Moth and considered a descendant of the Conti ransomware syndicate. The group has reportedly demanded a US$13 million ransom and has begun leaking supposed negotiation chats to apply pressure, underscoring the high-value targeting of legal firms and their sensitive client data.


Threat Overview

This incident is a targeted data theft and extortion attack, not a traditional ransomware deployment where files are encrypted. The Silent Ransom Group, also tracked as Luna Moth, Chatty Spider, and UNC3753, specializes in data theft for extortion without the encryption component. This makes the attack faster and stealthier, as it avoids the noisy process of file encryption that often triggers security alerts.

The attack on Jones Day began with a successful phishing attack, which likely provided the initial foothold. Following the data exfiltration, SRG engaged in double extortion tactics:

  1. Data Theft: The primary objective was to steal sensitive data, in this case, confidential client files and internal communications.
  2. Extortion: The group then threatened to publicly release the stolen data unless a large ransom was paid. They created a post on their leak site and published alleged negotiation chats with Jones Day demanding $13 million.

The FBI has previously warned that this group has been systematically targeting U.S.-based law firms since 2023, recognizing them as repositories of highly sensitive and valuable information.

Technical Analysis

The attack chain highlights the group's sophistication and focus on social engineering.

  • Initial Access: The attack started with T1566 - Phishing. This could have been a simple link to a credential harvesting page or a malicious attachment that installed a backdoor.
  • Data Exfiltration: Once inside, the actors located and exfiltrated valuable data. This likely involved T1020 - Automated Exfiltration or T1537 - Transfer Data to Cloud Account, where data is moved to attacker-controlled cloud storage.
  • Extortion: The final phase is psychological, using a public leak site and media attention to pressure the victim into paying the ransom, a form of T1485 - Data Destruction (in the sense of destroying confidentiality).

Some reports on SRG's broader TTPs mention a unique tactic involving social engineering calls followed by an operative visiting the victim's office in person, posing as IT support to physically plug in a device and steal data. It is not confirmed if this tactic was used against Jones Day.

Impact Assessment

The impact on a law firm like Jones Day is multi-faceted and severe, even if only a limited number of files were accessed:

  • Client Trust and Reputational Damage: The core asset of a law firm is confidentiality. A breach, regardless of size, erodes client trust and can damage the firm's reputation for discretion and security.
  • Legal and Regulatory Liability: Jones Day faces potential legal action from the 10 affected clients and regulatory scrutiny. A breach of attorney-client privilege is a serious matter.
  • Financial Loss: The direct costs include incident response, forensic investigation, client notifications, and potentially the $13 million ransom if paid. Indirect costs stem from reputational harm and loss of business.
  • Compromise of Legal Strategy: The stolen data could contain sensitive information about litigation, mergers, or other confidential client matters, which could be used to the detriment of those clients.

IOCs

No specific technical Indicators of Compromise (IOCs) have been publicly released.

Detection & Response

Detecting data theft without encryption is challenging and requires a focus on data movement and user behavior.

  1. Data Loss Prevention (DLP): DLP solutions can detect and block the exfiltration of large volumes of data that match predefined patterns for sensitive information (e.g., documents marked 'attorney-client privileged').
  2. User and Entity Behavior Analytics (UEBA): UEBA tools can baseline normal user activity and alert on anomalies, such as a user account suddenly accessing and downloading hundreds of files from a document management system it doesn't normally interact with.
  3. Phishing Detection: Advanced email security solutions that can detect and block sophisticated phishing lures are critical for preventing the initial access.

D3FEND Reference: Key detection techniques are D3-UDTA - User Data Transfer Analysis to spot anomalous data egress and D3-RAPA - Resource Access Pattern Analysis to detect unusual file access patterns.

Mitigation

Mitigating this threat requires a combination of technical controls and security awareness.

  • Phishing-Resistant MFA: The most effective defense against phishing is to deploy phishing-resistant Multi-Factor Authentication (MFA), such as FIDO2 security keys, for all critical applications, especially email and document management systems. This is a core part of M1032 - Multi-factor Authentication.
  • Security Awareness Training: Train all employees to recognize and report sophisticated phishing and social engineering attempts. This is crucial under M1017 - User Training.
  • Principle of Least Privilege: Ensure users only have access to the data and systems they absolutely need to perform their jobs. This limits the amount of data a compromised account can access.
  • Network Egress Filtering: Strictly control and monitor outbound network traffic. Block connections to known malicious domains and consider a default-deny policy for outbound traffic from user workstations, allowing only what is necessary for business.

D3FEND Reference: Implementing D3-MFA - Multi-factor Authentication is the most impactful countermeasure against the initial access vector.

Timeline of Events

1
April 7, 2026
Jones Day discloses it was the victim of a phishing attack and data breach.
2
April 8, 2026
Silent Ransom Group publicly claims responsibility and leaks alleged negotiation chats demanding a $13 million ransom.
3
April 9, 2026
This article was published

MITRE ATT&CK Mitigations

Enforce MFA, especially phishing-resistant MFA like FIDO2, on all external-facing services and critical internal systems to prevent account takeovers from stolen credentials.

Mapped D3FEND Techniques:

Conduct regular, practical security awareness training to help employees identify and report sophisticated phishing and social engineering attempts.

Audit

M1047enterprise

Implement robust logging and auditing of file access and data transfers, and use UEBA tools to detect anomalous activity indicative of data theft.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The attack on Jones Day began with phishing, a tactic designed to steal credentials. The single most effective countermeasure against this initial access vector is Multi-factor Authentication, particularly phishing-resistant forms like FIDO2/WebAuthn security keys. By requiring a physical token for authentication, attackers cannot gain access even if they successfully trick an employee into revealing their password. For a high-value target like a global law firm, deploying phishing-resistant MFA on all critical systems—especially email, VPN, and the document management system—is a foundational and non-negotiable security control. This moves the security posture from relying on fallible human behavior (not clicking the link) to relying on a strong technical control (possession of the security key).

Since the Silent Ransom Group focuses on data theft rather than encryption, detecting the attack requires focusing on data movement. User Data Transfer Analysis is a critical D3FEND technique for this purpose. Security teams should deploy tools (like CASB, DLP, or NDR) to monitor and baseline the volume and type of data transferred by each user. An alert should be triggered if a user account suddenly begins exfiltrating an unusually large volume of data, especially to an external destination like a personal cloud storage account or an unknown IP address. For Jones Day, this would mean flagging an employee account that suddenly downloads terabytes of client files and uploads them to an external service. This provides a crucial opportunity to detect and stop a data breach in progress, before the extortion phase even begins.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachPhishingRansomwareSilent Ransom GroupContiJones DayLegal

📢 Share This Article

Help others stay informed about cybersecurity threats